Configuring the Network

At this point, you might have created users who can assume roles,
and have created the roles. Only the root role can modify system files.

From the following network tasks, perform the tasks that provide additional security according
to your site requirements. These network tasks notify users who are logging in
remotely that the system is protected, and strengthen the IP, ARP, and TCP
protocols.